WO2000018109A1 - Procede relatif a la confirmation de l'integrite d'une image transmise avec perte - Google Patents

Procede relatif a la confirmation de l'integrite d'une image transmise avec perte Download PDF

Info

Publication number
WO2000018109A1
WO2000018109A1 PCT/EP1999/007024 EP9907024W WO0018109A1 WO 2000018109 A1 WO2000018109 A1 WO 2000018109A1 EP 9907024 W EP9907024 W EP 9907024W WO 0018109 A1 WO0018109 A1 WO 0018109A1
Authority
WO
WIPO (PCT)
Prior art keywords
cells
image
fingeφrint
random numbers
sequence
Prior art date
Application number
PCT/EP1999/007024
Other languages
English (en)
Inventor
William P. Lord
Mohamed Abdel-Mottaleb
Michael A. Epstein
Original Assignee
Koninklijke Philips Electronics N.V.
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Koninklijke Philips Electronics N.V. filed Critical Koninklijke Philips Electronics N.V.
Priority to KR1020007005617A priority Critical patent/KR100699703B1/ko
Priority to EP99950535A priority patent/EP1046277A1/fr
Priority to JP2000571645A priority patent/JP4037614B2/ja
Publication of WO2000018109A1 publication Critical patent/WO2000018109A1/fr

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04NPICTORIAL COMMUNICATION, e.g. TELEVISION
    • H04N1/00Scanning, transmission or reproduction of documents or the like, e.g. facsimile transmission; Details thereof
    • H04N1/32Circuits or arrangements for control or supervision between transmitter and receiver or between image input and image output device, e.g. between a still-image camera and its memory or between a still-image camera and a printer device
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04NPICTORIAL COMMUNICATION, e.g. TELEVISION
    • H04N1/00Scanning, transmission or reproduction of documents or the like, e.g. facsimile transmission; Details thereof
    • H04N1/32Circuits or arrangements for control or supervision between transmitter and receiver or between image input and image output device, e.g. between a still-image camera and its memory or between a still-image camera and a printer device
    • H04N1/32101Display, printing, storage or transmission of additional information, e.g. ID code, date and time or title
    • H04N1/32128Display, printing, storage or transmission of additional information, e.g. ID code, date and time or title attached to the image data, e.g. file header, transmitted message header, information on the same page or in the same computer file as the image
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04NPICTORIAL COMMUNICATION, e.g. TELEVISION
    • H04N2201/00Indexing scheme relating to scanning, transmission or reproduction of documents or the like, and to details thereof
    • H04N2201/32Circuits or arrangements for control or supervision between transmitter and receiver or between image input and image output device, e.g. between a still-image camera and its memory or between a still-image camera and a printer device
    • H04N2201/3201Display, printing, storage or transmission of additional information, e.g. ID code, date and time or title
    • H04N2201/3225Display, printing, storage or transmission of additional information, e.g. ID code, date and time or title of data relating to an image, a page or a document
    • H04N2201/3233Display, printing, storage or transmission of additional information, e.g. ID code, date and time or title of data relating to an image, a page or a document of authentication information, e.g. digital signature, watermark
    • H04N2201/3236Details of authentication information generation
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04NPICTORIAL COMMUNICATION, e.g. TELEVISION
    • H04N2201/00Indexing scheme relating to scanning, transmission or reproduction of documents or the like, and to details thereof
    • H04N2201/32Circuits or arrangements for control or supervision between transmitter and receiver or between image input and image output device, e.g. between a still-image camera and its memory or between a still-image camera and a printer device
    • H04N2201/3201Display, printing, storage or transmission of additional information, e.g. ID code, date and time or title
    • H04N2201/3278Transmission

Definitions

  • a fingerprint or "hash” is taken of the digital image. Hashing algorithms (i.e. one-way functions) are well known and easy to calculate but very difficult to mathematically invert.
  • the fingerprint is typically encrypted with an encryption key to prove or authenticate the creator of the signature.
  • the encryption itself is a standard public/private key cryptology with the source station utilizing a private key.
  • the resulting signature can be decrypted by a receiving station with the source's public key.
  • the hash-key combination along with the original image, is then sent to the receiving station which uses the public key of the presumed transmitter in decrypting the encrypted hash.
  • the method should include a fingerprint which is simple to compute from the image but difficult to create an image that has a given fingerprint.
  • the fingerprint method also should have the characteristic that it would be difficult to generate two images that have the same fingerprint.
  • the fingerprint method should be operable when losses are experienced through transmission of the digitized signal.
  • One aspect of the invention is a method for confirming the integrity of a transmitted image including the steps of dividing the image into a first plurality of cells having a first sequence, generating a random seed and generating a first plurality of pseudo random numbers based upon said random seed.
  • the method further includes the steps of creating the image into a second plurality of cells based upon the first plurality of pseudo random numbers and the first plurality of cells and generating a second plurality of pseudo random numbers, the second plurality of pseudo random numbers forming a second sequence.
  • the method also includes the steps of comparing cells corresponding to the first sequence with cells corresponding to the second sequence, in forming a first finge ⁇ rint, and transmitting the finge ⁇ rint, the image, and the random seed to a receiver.
  • the method still further includes the steps of producing a second finge ⁇ rint, by the receiver, using the image and the random seed that was received, and comparing the first and second finge ⁇ rints.
  • This method makes it difficult for a third party to manipulate an image without changing the finge ⁇ rint of that image.
  • the finge ⁇ rint itself is easy to create if one knows the seed. But, this seed will be unknown by a third party. Even though the image will be sent with losses, the finge ⁇ rint will not change and so it still can be used to monitor the integrity of the image.
  • Another aspect of the present invention is a method for creating a finge ⁇ rint of an image including the steps of dividing the image into a first plurality of cells having a first sequence, generating a random seed, generating a first plurality of pseudo random numbers based upon the random seed, and dividing the image into a second plurality of cells based upon the first plurality of pseudo random numbers and the first plurality of cells.
  • the method also includes the steps of generating a second plurality of pseudo random numbers, the second plurality of pseudo random numbers forming a second sequence, and comparing cells corresponding to the first sequence with cells corresponding to the second sequence, in forming the finge ⁇ rint.
  • This finge ⁇ rint has the same benefits as the finge ⁇ rint stated above.
  • a computer readable storage medium has encoded data for dividing an image into a first plurality of cells having a first sequence, generating a random seed, and generating a first plurality of pseudo random numbers based upon the random seed.
  • the medium further has data for creating the image into a second plurality of cells based upon the first plurality of pseudo random numbers and the first plurality of cells, generating a second plurality of pseudo random numbers, the second plurality of pseudo random numbers forming a second sequence, and comparing cells corresponding to the first sequence with cells corresponding to the second sequence, in forming a finge ⁇ rint.
  • Fig. 1 is a diagram showing the division and ordering of cells of an image to be transmitted according to the invention
  • Fig. 2 is a diagram showing newly created cells in accordance with the invention
  • Fig. 3 is a diagram of a representative finge ⁇ rint in accordance with the invention.
  • Fig. 4 is a flow chart of a method for generation of a signal to be transmitted representing, in part, the image and finge ⁇ rint of Fig. 3;
  • Fig. 5 is a flow chart of a method for receiving a transmitted image and finge ⁇ rint of Fig. 3 and for confirming the integrity of that image.
  • a n x n grid 100 is applied to a source digital image
  • n 2 cells under step 200.
  • the value of n depends upon the processing power and probability of accuracy desired.
  • the n 2 cells are numbered (Cl, C2, C3. . .Cn 2 ) in accordance with any suitable numbering system desired.
  • a random seed "r" is generated. The best way to make this random seed is from a source in nature. For example, electrical noise, radioactive decay, or cosmic rays from the sun. Anything unpredictable that can not be altered easily would form an optimal source.
  • n 2 pseudo-random numbers are generated.
  • each cell (Cl, C2, C3. . .Cn 2 ) is then manipulated (i.e. displaced and scaled) as a result of its respective prn.
  • each cell could be displaced from its origin by the prn and then the width and height changed by the same amount (or by a different amounts generated by multiple prns) as the displacement. If displacement causes a cell to go beyond the original image's boundaries, the cell wraps around to the other side as shown in Fig. 2. As is evident, many cells now overlap. The size and location of these new cells (Cl', C2', C3'. . .Cn ') is unknown to a third party.
  • Prior art finge ⁇ rints produced an evaluation metric for each cell thereby creating a corresponding value. Many techniques could be used to find this metric.
  • the measure could be the amount of a particular color in each cell, a sum of the values of the pixels, or a discrete cosine transform ("DCT").
  • DCT discrete cosine transform
  • a third party could easily create a different image that would have the same finge ⁇ rint. If green were the variable, for example, a third party would merely have to produce cells which have the same amount of green in them. However, if a third party attempted to recreate an image with the finge ⁇ rint of the present invention, he would interfere with multiple overlapping cells.
  • an evaluation metric is taken for each resulting area of the image.
  • the actual measure used is not important and any of the prior art techniques could be implemented. Experimentation has found that if a DCT is used only the DC value is necessary; the AC values do not significantly contribute to the calculation.
  • An assortment of techniques could be available and chosen by a user or randomly chosen using the pseudo-random numbers described above. This assortment of techniques could also be combined together to form one large signature. The goal is to make a signature so that it would be difficult for a third party to create a different image with the same signature.
  • a finge ⁇ rint is created by comparing the relationship between the pairs to a threshold. If the difference between a pair is above the threshold, a "1" is entered into the finge ⁇ rint. Otherwise, a "0" is entered. Each pair thus produces one bit of a finge ⁇ rint that is n 2 bits long.
  • An example of a finge ⁇ rint is shown in Fig. 3. The finge ⁇ rint could be stored on any storage medium or can be transmitted immediately.
  • both the finge ⁇ rint and the image are sent.
  • the image is sent in the same way as it would have been.
  • digital data may be sent during the vertical blanking interval (VBI).
  • VBI vertical blanking interval
  • pixels are illuminated horizontally, row by row.
  • the last pixel is energized, a finite period of time is required to traverse back to the beginning of the screen. During this time, called the VBI, digital data can be received.
  • VBI vertical blanking interval
  • the image and finge ⁇ rint are decrypted using A's public key.
  • the result will be nonsensical if any other source but A sent the message. If the wrong public key is used (for example a third station C), the result will also not make sense.
  • the receiver now has the signature and E(r) and uses its own private key to obtain r.
  • Receiver B performs the same steps on the image it received as A performed previously. Those steps include: dividing the image into an n-by-n grid, generating pseudo- numbers, etc. This will also produce a finge ⁇ rint of the image received.
  • the receiving station compares this generated finge ⁇ rint with the finge ⁇ rint received. These two finge ⁇ rints should be the same. The comparison could be in real time or the finge ⁇ rints could be stored and compared later. Even though there is loss in the transmission, that loss should not affect the finge ⁇ rint so much that it will significantly change.
  • n the number of cells created, n, could be increased or decreased depending upon the security desired by a user.

Landscapes

  • Engineering & Computer Science (AREA)
  • Multimedia (AREA)
  • Signal Processing (AREA)
  • General Engineering & Computer Science (AREA)
  • Collating Specific Patterns (AREA)
  • Storage Device Security (AREA)
  • Facsimile Transmission Control (AREA)
  • Editing Of Facsimile Originals (AREA)
  • Facsimile Image Signal Circuits (AREA)

Abstract

Une image numérique est divisée en plusieurs cellules comportant une première séquence. Une valeur de départ aléatoire est établie et utilisée pour déterminer deux séries de nombres pseudo-aléatoires. La première série de nombres est utilisée pour modifier l'emplacement et la forme des cellules, ce qui permet de créer une nouvelle série de cellules dans laquelle l'image est divisée. La seconde série de nombres permet de créer une seconde séquence. Chacune des nouvelles cellules correspondant à la première séquence est comparée à une autre nouvelle cellule correspondant à la nouvelle séquence. Cette comparaison est liée à un seuil et donne une empreinte. L'empreinte résultante est transmise avec l'image et la valeur de départ aléatoire. Un récepteur applique le même algorithme à l'image qu'il reçoit. Si le récepteur produit la même empreinte que l'empreinte qu'il reçoit, on part du principe que l'image n'a pas été modifiée.
PCT/EP1999/007024 1998-09-23 1999-09-21 Procede relatif a la confirmation de l'integrite d'une image transmise avec perte WO2000018109A1 (fr)

Priority Applications (3)

Application Number Priority Date Filing Date Title
KR1020007005617A KR100699703B1 (ko) 1998-09-23 1999-09-21 손실을 가지고 전송된 이미지의 무결성을 확인하는 방법
EP99950535A EP1046277A1 (fr) 1998-09-23 1999-09-21 Procede relatif a la confirmation de l'integrite d'une image transmise avec perte
JP2000571645A JP4037614B2 (ja) 1998-09-23 1999-09-21 損失を伴い伝送される画像の保全性確認方法

Applications Claiming Priority (2)

Application Number Priority Date Filing Date Title
US09/159,288 US6266429B1 (en) 1998-09-23 1998-09-23 Method for confirming the integrity of an image transmitted with a loss
US09/159,288 1998-09-23

Publications (1)

Publication Number Publication Date
WO2000018109A1 true WO2000018109A1 (fr) 2000-03-30

Family

ID=22571911

Family Applications (1)

Application Number Title Priority Date Filing Date
PCT/EP1999/007024 WO2000018109A1 (fr) 1998-09-23 1999-09-21 Procede relatif a la confirmation de l'integrite d'une image transmise avec perte

Country Status (6)

Country Link
US (1) US6266429B1 (fr)
EP (1) EP1046277A1 (fr)
JP (1) JP4037614B2 (fr)
KR (1) KR100699703B1 (fr)
CN (1) CN1156145C (fr)
WO (1) WO2000018109A1 (fr)

Cited By (11)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2001030064A1 (fr) * 1999-10-15 2001-04-26 Koninklijke Philips Electronics N.V. Systeme d'authentification d'image ou de video
WO2005091642A1 (fr) * 2004-03-19 2005-09-29 Koninklijke Philips Electronics N.V. Integration et extraction d'un germe en liaison avec un signal de television pour production de bruit pseudo-aleatoire
WO2006057994A2 (fr) * 2004-11-24 2006-06-01 Thomson Licensing Technique de simulation de grain d'emulsion pour dispositifs de reproduction de medias
EP2139220A3 (fr) * 2008-06-27 2010-07-21 Canon Kabushiki Kaisha Appareil et procédé de traitement d'informations
US8150206B2 (en) 2004-03-30 2012-04-03 Thomson Licensing Method and apparatus for representing image granularity by one or more parameters
US8238613B2 (en) 2003-10-14 2012-08-07 Thomson Licensing Technique for bit-accurate film grain simulation
US9098916B2 (en) 2004-11-17 2015-08-04 Thomson Licensing Bit-accurate film grain simulation method based on pre-computed transformed coefficients
US9177364B2 (en) 2004-11-16 2015-11-03 Thomson Licensing Film grain simulation method based on pre-computed transform coefficients
US10237258B2 (en) 2016-11-30 2019-03-19 International Business Machines Corporation Single key authentication method
US10599828B2 (en) 2016-11-30 2020-03-24 International Business Machines Corporation Single key authentication method
US10715834B2 (en) 2007-05-10 2020-07-14 Interdigital Vc Holdings, Inc. Film grain simulation based on pre-computed transform coefficients

Families Citing this family (23)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US8326584B1 (en) 1999-09-14 2012-12-04 Gracenote, Inc. Music searching methods based on human perception
ATE445190T1 (de) 2000-08-23 2009-10-15 Gracenote Inc Verfahren zur verbesserten wiedergabe von informationen, client-system und server-system
KR100353731B1 (ko) * 2000-11-01 2002-09-28 (주)니트 젠 일회성 지문템플릿을 이용한 사용자 인증시스템 및 방법
US6842743B2 (en) * 2000-12-01 2005-01-11 Matsushita Electric Industrial Co., Ltd. Transparent secure electronic credit card transaction protocol with content-based authentication
ATE405101T1 (de) 2001-02-12 2008-08-15 Gracenote Inc Verfahren zum erzeugen einer identifikations hash vom inhalt einer multimedia datei
US7269338B2 (en) 2001-12-11 2007-09-11 Koninklijke Philips Electronics N.V. Apparatus and method for synchronizing presentation from bit streams based on their content
US7197143B2 (en) * 2002-01-18 2007-03-27 The Johns Hopkins University Digital video authenticator
KR20040086350A (ko) 2002-02-05 2004-10-08 코닌클리케 필립스 일렉트로닉스 엔.브이. 핑거프린트의 효율적 저장
US7167574B2 (en) * 2002-03-14 2007-01-23 Seiko Epson Corporation Method and apparatus for content-based image copy detection
US7110338B2 (en) * 2002-08-06 2006-09-19 Matsushita Electric Industrial Co., Ltd. Apparatus and method for fingerprinting digital media
US7240200B2 (en) * 2002-09-26 2007-07-03 International Business Machines Corporation System and method for guaranteeing software integrity via combined hardware and software authentication
EP1550297B1 (fr) * 2002-09-30 2009-03-18 Gracenote, Inc. Extraction de condenses
CN1711531A (zh) * 2002-11-12 2005-12-21 皇家飞利浦电子股份有限公司 采指纹多媒体内容
US7532804B2 (en) * 2003-06-23 2009-05-12 Seiko Epson Corporation Method and apparatus for video copy detection
JP4282520B2 (ja) * 2004-03-24 2009-06-24 シャープ株式会社 信号処理方法、信号出力装置、信号処理装置、画像処理装置、及び画像形成装置
US20080092031A1 (en) * 2004-07-30 2008-04-17 Steven John Simske Rich media printer
US7486827B2 (en) * 2005-01-21 2009-02-03 Seiko Epson Corporation Efficient and robust algorithm for video sequence matching
US20070106405A1 (en) * 2005-08-19 2007-05-10 Gracenote, Inc. Method and system to provide reference data for identification of digital content
ATE404914T1 (de) * 2006-02-15 2008-08-15 Jaycrypto Ltd Verfahren und vorrichtung zum erzeugen von initialwerten für einen zufallszahlengenerator
JP2008022373A (ja) * 2006-07-13 2008-01-31 Canon Inc 改竄検知情報生成装置、撮像装置、改竄検知情報生成方法、プログラムおよび記憶媒体
US20080274687A1 (en) * 2007-05-02 2008-11-06 Roberts Dale T Dynamic mixed media package
US20090196425A1 (en) * 2008-02-06 2009-08-06 Dean Boland Method for Authenticating Electronically Stored Information
US9530072B2 (en) * 2013-03-15 2016-12-27 Dropbox, Inc. Duplicate/near duplicate detection and image registration

Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US5189700A (en) * 1989-07-05 1993-02-23 Blandford Robert R Devices to (1) supply authenticated time and (2) time stamp and authenticate digital documents
WO1995020291A1 (fr) * 1994-01-19 1995-07-27 Highwater Fbi Limited Procede et dispositif servant a manipuler des donnees numeriques
US5499294A (en) * 1993-11-24 1996-03-12 The United States Of America As Represented By The Administrator Of The National Aeronautics And Space Administration Digital camera with apparatus for authentication of images produced from an image file

Family Cites Families (17)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
FR2406359A1 (fr) * 1977-10-11 1979-05-11 Thomson Csf Procede et dispositif de traitement d'image pour systeme de visualisation et systeme de visualisation comprenant un tel dispositif
US5153918A (en) * 1990-11-19 1992-10-06 Vorec Corporation Security system for data communications
US5144667A (en) * 1990-12-20 1992-09-01 Delco Electronics Corporation Method of secure remote access
US5583950A (en) * 1992-09-16 1996-12-10 Mikos, Ltd. Method and apparatus for flash correlation
JP2518503B2 (ja) * 1993-03-08 1996-07-24 日本電気株式会社 画面切り替え検出方法
US5768426A (en) * 1993-11-18 1998-06-16 Digimarc Corporation Graphics processing system employing embedded code signals
US5832119C1 (en) * 1993-11-18 2002-03-05 Digimarc Corp Methods for controlling systems using control signals embedded in empirical data
NZ336413A (en) * 1993-12-01 2000-01-28 Rpk Nz Ltd Method of generating random numbers by manipulating electronic pointer with coordinates at points corresponding to time instants being used for selection of points subset and computation of number function
US5465353A (en) * 1994-04-01 1995-11-07 Ricoh Company, Ltd. Image matching and retrieval by multi-access redundant hashing
US5987634A (en) * 1994-11-17 1999-11-16 Cirrus Logic, Inc. Channel quality circuit in a sampled amplitude read channel
EP2110732A3 (fr) * 1995-02-13 2009-12-09 Intertrust Technologies Corporation Systèmes et procédés de gestion de transactions sécurisées et de protection des droits électroniques
JP3541522B2 (ja) * 1995-10-09 2004-07-14 松下電器産業株式会社 機器間通信保護システムおよび機器
US5859920A (en) * 1995-11-30 1999-01-12 Eastman Kodak Company Method for embedding digital information in an image
GB9601924D0 (en) * 1996-01-31 1996-04-03 Certicom Corp Transaction verification protocol for smart cards
US5857025A (en) * 1996-09-09 1999-01-05 Intelligent Security Systems, Inc. Electronic encryption device and method
JP3526524B2 (ja) * 1996-10-31 2004-05-17 松下電器産業株式会社 一方向データ変換装置及び機器認証システム
US5960081A (en) * 1997-06-05 1999-09-28 Cray Research, Inc. Embedding a digital signature in a video sequence

Patent Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US5189700A (en) * 1989-07-05 1993-02-23 Blandford Robert R Devices to (1) supply authenticated time and (2) time stamp and authenticate digital documents
US5499294A (en) * 1993-11-24 1996-03-12 The United States Of America As Represented By The Administrator Of The National Aeronautics And Space Administration Digital camera with apparatus for authentication of images produced from an image file
WO1995020291A1 (fr) * 1994-01-19 1995-07-27 Highwater Fbi Limited Procede et dispositif servant a manipuler des donnees numeriques

Non-Patent Citations (2)

* Cited by examiner, † Cited by third party
Title
DAVERN P ET AL: "FRACTAL BASED IMAGE STEGANOGRAPHY", INFORMATION HIDING. INTERNATIONAL WORKSHOP PROCEEDINGS,XX,XX, 30 May 1996 (1996-05-30), pages 279 - 294, XP002048612 *
SZEPANSKI W: "A SIGNAL THEORETIC METHOD FOR CREATING FORGERY-PROOF DOCUMENTS FOR AUTOMATIC VERIFICATION", PROCEEDINGS OF THE INTERNATIONAL CARNAHAN CONFERENCE ON SECURITY TECHNOLOGY: CRIME COUNTERMEASURES,US,NEW YORK, IEEE, vol. -, 1979, pages 101 - 109, XP002007950 *

Cited By (15)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2001030064A1 (fr) * 1999-10-15 2001-04-26 Koninklijke Philips Electronics N.V. Systeme d'authentification d'image ou de video
US8238613B2 (en) 2003-10-14 2012-08-07 Thomson Licensing Technique for bit-accurate film grain simulation
WO2005091642A1 (fr) * 2004-03-19 2005-09-29 Koninklijke Philips Electronics N.V. Integration et extraction d'un germe en liaison avec un signal de television pour production de bruit pseudo-aleatoire
US8150206B2 (en) 2004-03-30 2012-04-03 Thomson Licensing Method and apparatus for representing image granularity by one or more parameters
US9177364B2 (en) 2004-11-16 2015-11-03 Thomson Licensing Film grain simulation method based on pre-computed transform coefficients
US9098916B2 (en) 2004-11-17 2015-08-04 Thomson Licensing Bit-accurate film grain simulation method based on pre-computed transformed coefficients
US8023567B2 (en) 2004-11-24 2011-09-20 Thomson Licensing Film grain simulation technique for use in media playback devices
AU2005309719B2 (en) * 2004-11-24 2010-07-01 Interdigital Vc Holdings, Inc. Film grain simulation technique for use in media playback devices
WO2006057994A3 (fr) * 2004-11-24 2006-08-24 Thomson Licensing Technique de simulation de grain d'emulsion pour dispositifs de reproduction de medias
WO2006057994A2 (fr) * 2004-11-24 2006-06-01 Thomson Licensing Technique de simulation de grain d'emulsion pour dispositifs de reproduction de medias
US10715834B2 (en) 2007-05-10 2020-07-14 Interdigital Vc Holdings, Inc. Film grain simulation based on pre-computed transform coefficients
EP2139220A3 (fr) * 2008-06-27 2010-07-21 Canon Kabushiki Kaisha Appareil et procédé de traitement d'informations
US8396288B2 (en) 2008-06-27 2013-03-12 Canon Kabushiki Kaisha Information processing apparatus and information processing method for image verification
US10237258B2 (en) 2016-11-30 2019-03-19 International Business Machines Corporation Single key authentication method
US10599828B2 (en) 2016-11-30 2020-03-24 International Business Machines Corporation Single key authentication method

Also Published As

Publication number Publication date
CN1288633A (zh) 2001-03-21
US6266429B1 (en) 2001-07-24
JP4037614B2 (ja) 2008-01-23
EP1046277A1 (fr) 2000-10-25
KR20010015837A (ko) 2001-02-26
KR100699703B1 (ko) 2007-03-27
JP2002525983A (ja) 2002-08-13
CN1156145C (zh) 2004-06-30

Similar Documents

Publication Publication Date Title
US6266429B1 (en) Method for confirming the integrity of an image transmitted with a loss
Fridrich Security of fragile authentication watermarks with localization
Fei et al. Analysis and design of secure watermark-based authentication systems
Liu et al. An image fragile watermark scheme based on chaotic image pattern and pixel-pairs
US6834344B1 (en) Semi-fragile watermarks
Holliman et al. Counterfeiting attacks on oblivious block-wise independent invisible watermarking schemes
Fridrich et al. Further attacks on Yeung-Mintzer fragile watermarking scheme
EP0953938B1 (fr) Méthode et appareil pour filigrane digital d'images
Lou et al. A steganographic scheme for secure communications based on the chaos and Euler theorem
KR100878579B1 (ko) 워터마킹 방법, 워터마크 확인 방법, 워터마킹 장치 및워터마크 확인 장치
Qiao et al. Watermarking methods for MPEG encoded video: Towards resolving rightful ownership
AU2005255946B2 (en) Systems and methods for digital content security
Li et al. Image authentication and integrity verification via content-based watermarks and a public key cryptosystem
Li et al. Oblivious fragile watermarking scheme for image authentication
Ernawan et al. Self-recovery in fragile image watermarking using integer wavelet transform
US7627761B2 (en) System for authentication of JPEG image data
Zhao Dual domain semi-fragile watermarking for image authentication
Lou et al. Digital signature-based image authentication
Lamy et al. Content-Based Watermarking for Image Authentication
KR100685485B1 (ko) 비대칭 워터마킹 시스템 및 방법
Memon et al. Authentication techniques for multimedia content
Chaudhari Secure dissemination and protection of raster data using merkle hash tree based cryptowatermarking
Ting et al. A provable watermark-based copyright protection scheme
Fei et al. Achieving computational and unconditional security in authentication watermarking: analysis, insights, and algorithms
Chen et al. A wavelet-based public key image authentication watermarking

Legal Events

Date Code Title Description
WWE Wipo information: entry into national phase

Ref document number: 99802343.4

Country of ref document: CN

AK Designated states

Kind code of ref document: A1

Designated state(s): CN JP KR

AL Designated countries for regional patents

Kind code of ref document: A1

Designated state(s): AT BE CH CY DE DK ES FI FR GB GR IE IT LU MC NL PT SE

WWE Wipo information: entry into national phase

Ref document number: 1999950535

Country of ref document: EP

WWE Wipo information: entry into national phase

Ref document number: 1020007005617

Country of ref document: KR

121 Ep: the epo has been informed by wipo that ep was designated in this application
WWP Wipo information: published in national office

Ref document number: 1999950535

Country of ref document: EP

WWP Wipo information: published in national office

Ref document number: 1020007005617

Country of ref document: KR

WWG Wipo information: grant in national office

Ref document number: 1020007005617

Country of ref document: KR